Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-26462

Опубликовано: 28 фев. 2024
Источник: redhat
CVSS3: 7.5

Описание

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.

Отчет

In the file ndr.c, a struct named b is defined, and its address is passed to the function k5_buf_init_dynamic. Inside this function, b is referred to as buf, and the malloc function is used to allocate dynamic memory for buf->data. After k5_buf_init_dynamic completes and returns, if an if statement evaluates to true, the program returns. During this process, the memory allocated to b is not freed, leading to a memory leak defect. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-401: Missing Release of Memory after Effective Lifetime vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive configurations necessary for operational requirements. Baseline and configuration setting controls ensure secure system and software configurations, while least functionality reduces the attack surface and minimizes the risk of resource exhaustion from memory leaks. The environment employs malicious code protections such as IDS/IPS and antimalware solutions to detect threats and provide real-time visibility into memory usage, helping prevent memory management issues before they lead to system crashes or exhaustion. Event logs are collected and analyzed for correlation, monitoring, alerting, and retention, supporting the detection of abnormal memory usage patterns that may indicate potential leaks. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the risk of input-based denial-of-service (DoS) attacks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are implemented to strengthen defenses against memory allocation vulnerabilities.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10krb5Not affected
Red Hat Enterprise Linux 6krb5Out of support scope
Red Hat Enterprise Linux 7krb5Out of support scope
Red Hat Enterprise Linux 8krb5Not affected
Red Hat Enterprise Linux 9krb5FixedRHSA-2024:933112.11.2024
Red Hat Enterprise Linux 9krb5FixedRHSA-2024:933112.11.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-401
https://bugzilla.redhat.com/show_bug.cgi?id=2266742krb5: Memory leak at /krb5/src/kdc/ndr.c

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 1 года назад

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

CVSS3: 5.5
nvd
больше 1 года назад

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

CVSS3: 5.5
msrc
4 месяца назад

Описание отсутствует

CVSS3: 5.5
debian
больше 1 года назад

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in / ...

CVSS3: 5.5
github
больше 1 года назад

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.

7.5 High

CVSS3